Attention CXOs: There's something you need before you BYOD.

I hope that it's obvious that before you start a BYOD program at your company that you have considered how you're going to manage those devices on your network. If you haven't explored a mobile device management (MDM) or mobile application management (MAM) suite, then you're not ready for BYOD. From a C-level seat, a bring your own device program saves money, effort and irritation but you have to manage it wisely. If you don't put some control on user-owned devices with a good management suite, you'll regret the day you bought into to this whole consumerization shtick.

MDM or MAM, Which is Better?

If you've done your homework, you realize that neither is superior over the other; they're different. Mobile device management takes more control of the device, provides remote wipe, remote lock and many other features to prevent App installation, to limit access to App stores, to deny access to jailbroken devices and to restrict which Apps can be run on the device during working hours. Some managers and users alike feel that this approach is heavy-handed, while others clearly see a need to create a more structured work environment.

Mobile application management takes a different approach. A typical MAM scenario involves installing one or two Apps on a new device to register it and to provide a secure link into the corporate network. MAM suites still have the same power as MDM to remotely wipe the corporate App, to deny jailbroken devices and to impose limitations while connected to the company portal. MAM is less intrusive and often requires less effort to convince users to allow access to their devices.

Managing Freedom

I have many readers comment negatively on corporate management of their devices. Some have said, "No way" to corporate assimilation and others have agreed reluctantly. I think there's some resistance because of the "I own this device and you're not going to control it" or the feeling that they're being spied on in some way.

First, I don't believe that any company executive has the time nor the inclination to spy on their workers beyond what's reasonable in a competitive corporate environment. No one wants to see their intellectual property sail out the door to a public site or to a competitor's hands. And, it's normal and legal to prevent theft at any level. The company owns your email, your IMs, your documents and your phone conversations.

Second, most BYOD programs are optional. You don't have to submit your device to the corporate monster. If your paranoia or personal habits put you in an opposing position to your company's goals, then don't partake. Either that or take the stipend given to you by the company to purchase a second "personal" device to use on the corporate network. This option makes the most sense for those who subscribe to conspiracy theories.

Third, BYOD is the new normal. In five years (my prediction), more than 90% of companies with 100 or more employees will have a BYOD program in place. It's a win-win for the company and the employee.

Finally, corporate BYOD programs must be managed. Even the most "personal freedom fighter" employee realizes that security is extremely important. You can choose to shop in stores that have no anti-theft equipment. You can choose to drive an automobile that has no GPS device. And, you can choose to work for another company, if you find that your personal freedoms are being violated beyond your tolerance level.

Personally, I wouldn't allow any personal device on my network without a strict management policy and application suite in place. Each employee would have to sign a document that outlines company responsibility and employee responsibility. And, absolutely no jailbroken devices allowed.

BYOD Going Forward

Managing devices is going to become interesting in the coming years. New devices will come equipped with the ability to have a personal device mode and a corporate device mode, which are separated by something akin to virtual machines. Other devices that can't handle the hypervisor concept will certainly have some "personality-aware" hardware and software on board that makes it easier for companies to manage them as personal devices. By personality, I'm referring to personal, corporate, airplane, secure, etc. modes that allow certain Apps and capabilities to be switched on and off when that device enters a managed space.

When an unmanaged device enters a managed zone, the user will be prompted to allow a personality to be engaged, rendering other personalities to be disengaged or the device will be essentially "bricked" and allowed no access.

CXOs have a responsibility to shareholders, to employees, to customers and to themselves. A BYOD program is part of that area of responsibility. A BYOD that's implemented in haphazard fashion will fail. You must have a management policy and a management suite in place before you BYOD. Developing a BYOD program doesn't mean that you, as a CXO, are a spy or a "bad guy" because you want to save money. Nor should it mean that you allow user devices on your network without control because you might offend someone.

If you're unsure where to turn for more information, I'll have a post up next week that lists several management suites available to you. Stay tuned for that list.

What do you think--could a company successfully implement a BYOD program without a management suite? Talk back and let me know.

Thank You

By registering you become a member of the CBS Interactive family of sites and you have read and agree to the Terms of Use, Privacy Policy and Video Services Policy. You agree to receive updates, alerts and promotions from CBS and that CBS may share information about you with our marketing partners so that they may contact you by email or otherwise about their products or services.
You will also receive a complimentary subscription to the ZDNet's Tech Update Today and ZDNet Announcement newsletters. You may unsubscribe from these newsletters at any time.